Mostrando 5 resultados de: 5
Subtipo de publicación
Article(5)
Publisher
Universidad y Sociedad(5)
Área temáticas
Ciencias de la computación(3)
Economía de la tierra y la energía(3)
Física aplicada(3)
Métodos informáticos especiales(1)
Design of an isolated hybrid system to supply hacienda quirola
ArticleAbstract: Renewable energies are a very important alternative for the generation of electricity, since they doPalabras claves:Automatic irrigation system, Homer, Hybrid system, Photovoltaic generator, renewable energiesAutores:Juan Carlos Pisco Vanegas, TORRES QUIJIJE ANGEL IVANFuentes:scopusImage processing system and its influence on residential energy consumption management
ArticleAbstract: Electricity has become an indispensable resource for the development of humanity for all the benefitPalabras claves:Classifiers, Computer Vision, Detection methods, Illumination systemsAutores:Bryan Del Valle Villacís, José Guillén Sánchez, José Luis Tubay, TORRES QUIJIJE ANGEL IVANFuentes:scopusSimulation of a yagi uda antenna using optimization methods based on genetic algorithms
ArticleAbstract: The article is about the optimization methods used in AG (genetic algorithms) for the design of antePalabras claves:Directivity, Genetic Algorithms, Optimization, Radiation patterns, Yagi uda antennaAutores:Bolívar Agustín Díaz-Chang, Ingrid Estefanía Cela Jaramillo, Jonathan Alexander Macías Rivera, TORRES QUIJIJE ANGEL IVANFuentes:scopusReal-time monitoring of residential electricity consumption that allows its proper management
ArticleAbstract: The poor reading of the meter that records the electrical consumption or excess of electrical consumPalabras claves:Energy efficiency, internet of things, Supervision, telemetryAutores:Iván Guillermo Vera García, Juan Carlos Pisco Vanegas, Roger Steven Pérez Parraga, TORRES QUIJIJE ANGEL IVANFuentes:googlescopusSTUDY OF DATA MINING TECHNIQUES FOR THE DETECTION OF ATTACKS IN THE NSL-KDD DATA SET
ArticleAbstract: The present investigation begins with a referential study of similar works based on scenarios for thPalabras claves:Data Mining, intrusion detection, NSL-KDD datasetAutores:Amilkar Yudier Puris Cáceres, Andrés Florencia Toala, Bryon Wladimir Oviedo Bayas, Emilio Zhuma, Hernández Palacios R., TORRES QUIJIJE ANGEL IVANFuentes:googlescopus